PHANTOM#SPIKE (Trojan) – Malware
In the ever-evolving landscape of cyber threats, the PHANTOM#SPIKE campaign stands out as a significant and concerning development...
In the ever-evolving landscape of cyber threats, the PHANTOM#SPIKE campaign stands out as a significant and concerning development...
The recent attack on WordPress plugins demonstrates the increasing sophistication of supply-chain attacks, particularly those targeting widely...
Venom Spider, a notorious threat actor also known as GOLDEN CHICKENS, has expanded its malicious toolkit with the introduction of two new...
Earth Kasha, a cybercriminal group that has been active since 2019, is known for using the LODEINFO malware as a primary backdoor...
A recent wave of phishing attacks, labeled CopyRh(ight)adamantys, has been employing copyright infringement scams to trick users...
A large-scale cyber operation named "EmeraldWhale" has successfully stolen over 15,000 cloud account credentials by scanning for exposed Git configuration...
Researchers have identified a concerning cyber campaign that employs Go Injector to deploy Lumma Stealer, a sophisticated piece of malware...
The Smishing Triad has emerged as a formidable player in the landscape of digital fraud, capturing attention with its increasingly sophisticated...
On June 6, 2024, a new and sophisticated cyber threat emerged against the Armed Forces of Ukraine, identified as the "SickSync" campaign...
The campaign demonstrates a sophisticated approach to facilitating information theft, with AZORult's capabilities dating back to 2016.
© 2024 | CyberMaterial | All rights reserved